1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
12

Why dose enginuty suck like really

Computers and Technology
1 answer:
masya89 [10]3 years ago
3 0

Answer:

if you don't like it why u doin it?

Explanation:

You might be interested in
What command do you type in the search box to access the command line intrface in windows?
Whitepunk [10]
Cmd.exe



------------------------------------------
3 0
3 years ago
Where should you look to find contact information about a company? I. on the company website II. at your local library III. in t
bixtya [17]

You should look on the company website in order to find contact information about a company,

The company website should contain the crucial Business Information, logical roadmap, contact information, easy navigation... The contact information should include number, email, address and a contact form. They should be easily accessible and visible.

4 0
3 years ago
Read 2 more answers
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
Carl wants to add two new characters to the extraterrestrial battleship game he's
nikitadnepr [17]

The option that  best explains the game is that a game can have multiple instances using the same class.

<h3>Can a class have multiple instances?</h3>

A game is one that can always create multiple instances of a class. This is known to be the reason that classes are made.

Conclusively,  each object often has its  own specific inner variables and they do not have only if they are static but games of multiple instances is the reason why there is only one class with the new characters.

Learn more about Games from

brainly.com/question/1786465

6 0
2 years ago
Other questions:
  • Which logic gate produces an output of 1 only if both it’s inputs are 0?
    5·1 answer
  • An electronic braille embosser that translates text from a braille keyboard to a printer:
    10·1 answer
  • Write an expression that executes the loop while the user enters a number greater than or equal to 0.
    10·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • How do you copy and paste plz let me know
    14·2 answers
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • A row in a table _____? for computer class and i’m in the middle of a test!
    14·1 answer
  • What are the advantages of customer relationship managment​
    10·1 answer
  • What is the code i need to do
    12·1 answer
  • Mario is designing a page layout for a sports magazine, and he decides to add the image of a cyclist. Which principle of page la
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!